SlideShare a Scribd company logo
1 of 23
Contention-Based SCMA for NB-IoT Uplink Communication using
Finite Memory Sequential Learning
Bayisa Taye MULATU
Advisor: Prof. Shigeru Shimamoto
August 1,2018
1
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
2
OUTLINE:
 BACKGROUND: NARROW-BAND IOT
 SPARSE-CODE MULTIPLE ACCESS
 NB-PULSE SHAPING
 CONTENTION-BASED SCMA RESOURCE DEFINITION
 CONTENTION-BASED SCMA VERSUS OFDMA
 CB-SCMA USING FMSL
 RESULTS AND DISCUSSION
 CONCLUSIONS
 REFERENCES
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
3
BACKGROUND: NARROW-BAND IOT
 NB-IoT provides deep-indoor coverage with low-cost and low-
power devices
 3 modes of operation by 3GPP, support massive connectivity of
low-power wide area network(LPWAN)
GSM NB-IOT(Standalone-200kHz)
NB-IoT(In-band-180kHz) NB-IOT(guard-band)
Fig. 1. Modes of operation in NB-IoT
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
4
Contention-based(CB) SCMA is applied in NB-IoT in order to:
 Remove or reduce resource allocation and control
signaling overhead.
 Reduce transmission latency
 Support massive connectivity
MOTIVATION
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
5
SPARSE-CODE MULTIPLE ACCESS (SCMA)
Fig 2: SCMA system
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
6
DESCRIPTION OF SCMA SYSTEM
 Codebooks 𝑱 = 𝑪𝑲
𝑵
; N=non-zero entries, K = codeword
length
 𝑩 = [𝒃𝟏 𝒃𝟐 …
𝒃𝟔]--> information bits from 6 users
 𝑿𝒌
=[𝒙𝟏
𝒌
, 𝒙𝟐
𝒌
, … , 𝒙𝟒
𝒌
]𝑻
--> transmitted symbols at 𝒌𝒕𝒉
user
 The received signal at the eNB:
𝒚 = 𝒌=𝟏
𝟒
‫ܪ‬݇‫ݔ‬݇ +Z ;
 𝑯𝒌 and Z -->channel gain and AWGN vectors
 MPA(Log-MPA) based multi-user detection is used to detect the
symbols from y.
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
7
NB-PULSE SHAPING
 OFDM systems use IFFT to map modulated symbols to multiple
sub-carriers
 IFFT is not suitable for low cost NB-IoT devices
 Frequency localized NB-pulse shaping is done by digital up-
sampler and digital-up converter
 This will simplify the signal processing complexity of NB-SCMA
system
Channel
coding
SCMA
encoder
NB-Pulse
shaping
Fading
channel
UE
Codebook
Fig 3: NB-SCMA system
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
8
CB-SCMA RESOURCE DEFINITION
f
t
Contention Region
Fig. 4. CB-SCMA resource definition
 Contention Transmission Unit (CTU) = f( f, t, Cj , Pl)
 J unique codebooks in a contention region
 L unique pilot sequences for each codebook
LXJ CTUs
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
9
CAPACITY GAIN OF CB-SCMA
 N out of K resources occupied in SCMA; all K occupied in OFDMA
 Capacity gain of SCMA over OFDMA=>In terms of number of
connections
 Gain =
𝐶𝐾
𝑁
xLx𝒎1
Kx𝒎2
𝑵𝑺𝑪𝑴𝑨 = 𝑪𝑲
𝑵
xLx𝒎𝟏
𝑵𝑶𝑭𝑫𝑴𝑨 = 𝐊x𝒎𝟐
𝑵 ≥ 𝟐, 𝟐 ≤ 𝑵 ≤K, 𝑳 ≥ 𝟐
𝒎1 = 𝒎2 = 𝑚 is assumed
(average number of UEs
in a CTU)
K=8,N=4 -> gain of 35
Fig 5: Capacity gain of CB-SCMA over OFDMA
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
10
PACKET DROP RATE OF CB-SCMA
 A packet drop rate is: 𝒓𝒍𝒐𝒔𝒕=𝟏−(𝟏−𝞪)𝒎−𝟏
 𝝰 is probability that each user sends packet at anytime
Fig 6: Packet Drop Rate of CB-SCMA
The effect of packet
collision is higher when
more users share same CTU
Finite memory sequential
learning (FMSL) is
proposed for the above
systems
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
11
CB-SCMA USING FMSL
Fig 7: CB-SCMA using finite memory sequential learning
Central Base
Station
IoT devices
communicate private
signals
M2M
IoT device
CB-SCMA
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
12
FINITE MEMORY SEQUENTIAL LEARNING
NB-IoT devices use FMSL to learn about the underlying
binary states ϴ (0 or 1) about a critical event and
exchange private signals sequentially
 The learning framework uses the following information:
𝑒𝑗−𝐹+4 , … , 𝑒𝑗−1, 𝑇𝑗−1, 𝑄𝑗−1, 𝑖, 𝐶𝑖
 𝑒𝑗−𝑭+4 , … , 𝑒𝑗−1 ->Previous private signals
 𝑇𝑗−1 ->Current estimate of true ϴ
 𝑄𝑗−1, ->update information for true ϴ
 𝑖, 𝐶𝑖 ->indicates critical messages and CTUs used
A NB-IoT device will determine its private signal(belief) 𝑥𝑖 by
maximum likelihood estimation:
𝑥𝑖 = 𝑎𝑟𝑔max
ϴ
𝑃𝑟(𝑒𝑗−𝑭+4 , … , 𝑒𝑗−1/ϴ)
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
13
PERFORMANCE OF FMSL
 Performance of FMSL depends on geographical location: Area A
 Distance from critical event: 𝑟𝑑
 Communication range among the devices: 𝑟𝑐
 Total number of devices that correctly learn true ϴ:
𝑼𝜋𝑟𝑑
2
4𝐴
≤ 𝐸 𝐿 ≤
𝑼𝜋𝑟𝑑
2
𝐴
 Effective Observation radius
𝑟𝑑
′
= 𝑟𝑑 +(𝐹 − 4) 𝑟𝑐
 𝐸 𝐿𝑡 :for occurrence after time t, 𝑟𝑡 =min(𝑟𝑐t, 𝑟𝑑
′
)
𝑼𝜋𝑟𝑡
2
4𝐴
≤ 𝐸 𝐿𝑡 ≤
𝑼𝜋𝑟𝑡
2
𝐴
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
14
PROBABILITY OF SUCCESS AND COLLISION
 Probability of successful transmission:
𝑈𝜋𝑟𝑡
2
4𝐴. 𝐶. 𝑇𝑚𝑖𝑛
≤ 𝐸 𝑃𝑡 ≤
𝑈𝜋𝑟𝑡
2
𝐴. 𝐶. 𝑇𝑚𝑖𝑛
 We assume the binomial distribution to analyze collision probability
 The Collision probability of a conventional UE-CTU mapping:
𝑃𝑐𝑜𝑛𝑣 =
𝐶 𝑘=2
𝑚
𝑝𝑚.𝑘.𝑝𝑘 𝑘=1
𝑚−1
𝑝𝒎−1.𝒌.𝑝 𝑘+1 +𝐶(1− 𝑘=2
𝑚
𝑝𝒎.𝒌.𝑝 𝒌=2
𝒎
𝑝𝒎.𝒌.𝑝𝑘)
𝐶𝑚𝑝
 The Collision Probability for SL based CTU allocation:
𝑃𝑆𝐿 =
( 𝑘 + 1 1 − 𝑚𝑎 − 𝑚 1 − 𝑎 𝑚𝑝 1 − 𝑞𝑚−1 +
𝑚 1 − 𝑎 − 𝑘(1 − 𝑚𝑎)( 𝒎 + 1)𝑝 1 − 𝑞𝒎−1 )
𝑚𝑝
𝑎 = 𝒌=2
𝒎
𝑝𝒎.𝒌.𝑝 = 𝒌=2
𝒎 𝑚
𝑝 𝑝𝑘𝑞𝒎−𝑘
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
15
PARAMETERS USED
 U ⇒ Number of devices deployed in the area A
 𝐂 ⇒The number of CTUs
 𝐓𝐦𝐢𝐧 ⇒Minimum periodicity of periodic messages
 m⇒Average number of devices in a CTU,
 𝑝 = 1 − 𝑞 ⇒traffic rate
 k ⇒ number of devices transmitting at the same time
within a CTU
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
16
RESULTS AND DISCUSSION(1)
Fig. 8. Probability of successful transmission
 probability of successful transmission increases with F
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
17
RESULTS AND DISCUSSION(2)
Fig. 9. Number of devices that learn true ϴ(F=14, U=1500, C=280)
 number of devices that learn correctly increases with time
and F
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
18
RESULTS AND DISCUSSION(3)
Fig. 10. Comparison of probability of collision
 Lower average collision rate than the conventional
system
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
19
CONCLUSIONS
The contention based SCMA with FMSL system shows that
performance in terms probability of successful transmission
and the number of IoT devices that will correctly learn about
the status of the nearby devices increases with memory size F.
 Hence, FMSL improves system performance in terms of
delivery of critical messages which are assigned certain codes
after the learning process converges.
When the devices are assigned certain codes after the learning
process converges, the probability of collision decreases as
compared to conventional systems.
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
20
REFERENCES
[1]. Y. D. Beyene, R. Jantti, K. Ruttik and S. Iraji, "On the Performance of Narrow-
Band Internet of Things (NB-IoT)," 2017 IEEE Wireless Communications and
Networking Conference (WCNC), San Francisco, CA, 2017, pp. 1-6.
[2]. D. Lin, G. Charbit and I. K. Fu, "Uplink Contention Based Multiple Access for 5G
Cellular IoT," 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall),
Boston, MA, 2015, pp. 1-5.
[3]. S. Zhang, X. Xu, L. Lu, Y. Wu, G. He and Y. Chen, Sparse code multiple access: An
energy efficient uplink approach for 5G wireless systems," 2014 IEEE Global
Communications Conference, Austin, TX, 2014, pp. 4782-4787.
[4]. J. Wang, C. Zhang, R. Li, G. Wang and J. Wang, Narrow-Band SCMA: A New
Solution for 5G IoT Uplink Communications," 2016 IEEE 84th Vehicular Technology
Conference (VTC-Fall), Montreal, QC, 2016, pp. 1-5.
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
21
[5]. K. Au et al., "Uplink contention based SCMA for 5G radio access," 2014 IEEE
Globecom Workshops (GCWkshps), Austin, TX, 2014, pp. 900-905.
[6]. J. Shen, W. Chen, F. Wei and Y. Wu, "ACK feedback based UE-to-CTU
mapping rule for SCMA uplink grant-free transmission," 2017 9th
International Conference on Wireless Communications and Signal
Processing (WCSP), Nanjing, 2017, pp. 1-6.Inf. Theory, vol. 59, no. 10, pp.
6859-6872, Oct. 2013.
[7] T. Park and W. Saad, "Learning with finite memory for machine type
communication," 2016 Annual Conference on Information Science and Systems
(CISS), Princeton, NJ, 2016, pp. 608-613.
[8] T. Park and W. Saad, "Resource Allocation and Coordination for Critical
Messages Using Finite Memory Learning," 2016 IEEE Globecom Workshops (GC
Wkshps), Washington, DC, 2016, pp. 1-6.
REFERENCES
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
22
RESEARCH CONTRIBUTION
Bayisa Taye Mulatu, Zhenni Pan, Jiang Liu, Shigeru Shimamoto,
“Contention-Based SCMA for Narrow-Band Internet of Things using
Sequential Learning”, in a proceeding of the 37th JSST Annual
International Conference on Simulation Technology, Muroran
Institute of Technology, Muroran City, Hokkaido, Japan, September
18-20, 2018.
Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential
23
Thank you for your
attention!

More Related Content

Similar to Bayisa Taye.pptx

IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
 
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...theijes
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkPatricia Viljoen
 
Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...Nazmul Hossain Rakib
 
Wang lab introduction_1204_2018
Wang lab introduction_1204_2018Wang lab introduction_1204_2018
Wang lab introduction_1204_2018俊廷 陳
 
Iaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd Iaetsd
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Wang lab introduction_1204_2018
Wang lab introduction_1204_2018Wang lab introduction_1204_2018
Wang lab introduction_1204_2018俊廷 陳
 
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...
IRJET- Implementation of Private GSM Network for Disaster Management and ...IRJET Journal
 
Grant free IoT, Ericsson Research Presentation
Grant free IoT, Ericsson Research PresentationGrant free IoT, Ericsson Research Presentation
Grant free IoT, Ericsson Research Presentationamin azari
 
IRJET- Power Line Carrier Communication
IRJET- Power Line Carrier CommunicationIRJET- Power Line Carrier Communication
IRJET- Power Line Carrier CommunicationIRJET Journal
 
10 oct00
10 oct0010 oct00
10 oct00trimba
 
Accessory authentication on NFC enabled product using three pass AES algorithm
Accessory authentication on NFC enabled product using three pass AES algorithmAccessory authentication on NFC enabled product using three pass AES algorithm
Accessory authentication on NFC enabled product using three pass AES algorithmIRJET Journal
 
IRJET - Display for Crew Station of Next Generation Main Battle Tank
IRJET - Display for Crew Station of Next Generation Main Battle TankIRJET - Display for Crew Station of Next Generation Main Battle Tank
IRJET - Display for Crew Station of Next Generation Main Battle TankIRJET Journal
 
OPC UA TSN - A new Solution for Industrial Communication | White Paper
OPC UA TSN - A new Solution for Industrial Communication | White PaperOPC UA TSN - A new Solution for Industrial Communication | White Paper
OPC UA TSN - A new Solution for Industrial Communication | White PaperB&R Industrial Automation
 
Electronic Nameplate System
Electronic Nameplate SystemElectronic Nameplate System
Electronic Nameplate SystemIRJET Journal
 
Study and Emulation of 10G-EPON with Triple Play
Study and Emulation of 10G-EPON with Triple PlayStudy and Emulation of 10G-EPON with Triple Play
Study and Emulation of 10G-EPON with Triple PlaySatya Prakash Rout
 

Similar to Bayisa Taye.pptx (20)

IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
 
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...Experimental simulation and real world study on wi fi ad-hoc mode for differe...
Experimental simulation and real world study on wi fi ad-hoc mode for differe...
 
Wang lab introduction_1204_2018
Wang lab introduction_1204_2018Wang lab introduction_1204_2018
Wang lab introduction_1204_2018
 
Iaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety message
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
Wang lab introduction_1204_2018
Wang lab introduction_1204_2018Wang lab introduction_1204_2018
Wang lab introduction_1204_2018
 
IRJET- Implementation of Private GSM Network for Disaster Management and ...
IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...IRJET-  	  Implementation of Private GSM Network for Disaster Management and ...
IRJET- Implementation of Private GSM Network for Disaster Management and ...
 
Grant free IoT, Ericsson Research Presentation
Grant free IoT, Ericsson Research PresentationGrant free IoT, Ericsson Research Presentation
Grant free IoT, Ericsson Research Presentation
 
IRJET- Power Line Carrier Communication
IRJET- Power Line Carrier CommunicationIRJET- Power Line Carrier Communication
IRJET- Power Line Carrier Communication
 
10 oct00
10 oct0010 oct00
10 oct00
 
Accessory authentication on NFC enabled product using three pass AES algorithm
Accessory authentication on NFC enabled product using three pass AES algorithmAccessory authentication on NFC enabled product using three pass AES algorithm
Accessory authentication on NFC enabled product using three pass AES algorithm
 
Hb3512341239
Hb3512341239Hb3512341239
Hb3512341239
 
IRJET - Display for Crew Station of Next Generation Main Battle Tank
IRJET - Display for Crew Station of Next Generation Main Battle TankIRJET - Display for Crew Station of Next Generation Main Battle Tank
IRJET - Display for Crew Station of Next Generation Main Battle Tank
 
OPC UA TSN - A new Solution for Industrial Communication | White Paper
OPC UA TSN - A new Solution for Industrial Communication | White PaperOPC UA TSN - A new Solution for Industrial Communication | White Paper
OPC UA TSN - A new Solution for Industrial Communication | White Paper
 
Electronic Nameplate System
Electronic Nameplate SystemElectronic Nameplate System
Electronic Nameplate System
 
Study and Emulation of 10G-EPON with Triple Play
Study and Emulation of 10G-EPON with Triple PlayStudy and Emulation of 10G-EPON with Triple Play
Study and Emulation of 10G-EPON with Triple Play
 

More from Abir Hossain

Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communicationAbir Hossain
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksAbir Hossain
 
Mixim tutorial link
Mixim tutorial linkMixim tutorial link
Mixim tutorial linkAbir Hossain
 
Important C program of Balagurusamy Book
Important C program of Balagurusamy BookImportant C program of Balagurusamy Book
Important C program of Balagurusamy BookAbir Hossain
 

More from Abir Hossain (7)

ch01.pdf
ch01.pdfch01.pdf
ch01.pdf
 
Introduction to data communication
Introduction to data communicationIntroduction to data communication
Introduction to data communication
 
chapter 1.ppt
chapter 1.pptchapter 1.ppt
chapter 1.ppt
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
Mixim tutorial link
Mixim tutorial linkMixim tutorial link
Mixim tutorial link
 
Abir cover letter
Abir cover letterAbir cover letter
Abir cover letter
 
Important C program of Balagurusamy Book
Important C program of Balagurusamy BookImportant C program of Balagurusamy Book
Important C program of Balagurusamy Book
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Bayisa Taye.pptx

  • 1. Contention-Based SCMA for NB-IoT Uplink Communication using Finite Memory Sequential Learning Bayisa Taye MULATU Advisor: Prof. Shigeru Shimamoto August 1,2018 1
  • 2. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 2 OUTLINE:  BACKGROUND: NARROW-BAND IOT  SPARSE-CODE MULTIPLE ACCESS  NB-PULSE SHAPING  CONTENTION-BASED SCMA RESOURCE DEFINITION  CONTENTION-BASED SCMA VERSUS OFDMA  CB-SCMA USING FMSL  RESULTS AND DISCUSSION  CONCLUSIONS  REFERENCES
  • 3. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 3 BACKGROUND: NARROW-BAND IOT  NB-IoT provides deep-indoor coverage with low-cost and low- power devices  3 modes of operation by 3GPP, support massive connectivity of low-power wide area network(LPWAN) GSM NB-IOT(Standalone-200kHz) NB-IoT(In-band-180kHz) NB-IOT(guard-band) Fig. 1. Modes of operation in NB-IoT
  • 4. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 4 Contention-based(CB) SCMA is applied in NB-IoT in order to:  Remove or reduce resource allocation and control signaling overhead.  Reduce transmission latency  Support massive connectivity MOTIVATION
  • 5. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 5 SPARSE-CODE MULTIPLE ACCESS (SCMA) Fig 2: SCMA system
  • 6. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 6 DESCRIPTION OF SCMA SYSTEM  Codebooks 𝑱 = 𝑪𝑲 𝑵 ; N=non-zero entries, K = codeword length  𝑩 = [𝒃𝟏 𝒃𝟐 … 𝒃𝟔]--> information bits from 6 users  𝑿𝒌 =[𝒙𝟏 𝒌 , 𝒙𝟐 𝒌 , … , 𝒙𝟒 𝒌 ]𝑻 --> transmitted symbols at 𝒌𝒕𝒉 user  The received signal at the eNB: 𝒚 = 𝒌=𝟏 𝟒 ‫ܪ‬݇‫ݔ‬݇ +Z ;  𝑯𝒌 and Z -->channel gain and AWGN vectors  MPA(Log-MPA) based multi-user detection is used to detect the symbols from y.
  • 7. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 7 NB-PULSE SHAPING  OFDM systems use IFFT to map modulated symbols to multiple sub-carriers  IFFT is not suitable for low cost NB-IoT devices  Frequency localized NB-pulse shaping is done by digital up- sampler and digital-up converter  This will simplify the signal processing complexity of NB-SCMA system Channel coding SCMA encoder NB-Pulse shaping Fading channel UE Codebook Fig 3: NB-SCMA system
  • 8. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 8 CB-SCMA RESOURCE DEFINITION f t Contention Region Fig. 4. CB-SCMA resource definition  Contention Transmission Unit (CTU) = f( f, t, Cj , Pl)  J unique codebooks in a contention region  L unique pilot sequences for each codebook LXJ CTUs
  • 9. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 9 CAPACITY GAIN OF CB-SCMA  N out of K resources occupied in SCMA; all K occupied in OFDMA  Capacity gain of SCMA over OFDMA=>In terms of number of connections  Gain = 𝐶𝐾 𝑁 xLx𝒎1 Kx𝒎2 𝑵𝑺𝑪𝑴𝑨 = 𝑪𝑲 𝑵 xLx𝒎𝟏 𝑵𝑶𝑭𝑫𝑴𝑨 = 𝐊x𝒎𝟐 𝑵 ≥ 𝟐, 𝟐 ≤ 𝑵 ≤K, 𝑳 ≥ 𝟐 𝒎1 = 𝒎2 = 𝑚 is assumed (average number of UEs in a CTU) K=8,N=4 -> gain of 35 Fig 5: Capacity gain of CB-SCMA over OFDMA
  • 10. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 10 PACKET DROP RATE OF CB-SCMA  A packet drop rate is: 𝒓𝒍𝒐𝒔𝒕=𝟏−(𝟏−𝞪)𝒎−𝟏  𝝰 is probability that each user sends packet at anytime Fig 6: Packet Drop Rate of CB-SCMA The effect of packet collision is higher when more users share same CTU Finite memory sequential learning (FMSL) is proposed for the above systems
  • 11. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 11 CB-SCMA USING FMSL Fig 7: CB-SCMA using finite memory sequential learning Central Base Station IoT devices communicate private signals M2M IoT device CB-SCMA
  • 12. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 12 FINITE MEMORY SEQUENTIAL LEARNING NB-IoT devices use FMSL to learn about the underlying binary states ϴ (0 or 1) about a critical event and exchange private signals sequentially  The learning framework uses the following information: 𝑒𝑗−𝐹+4 , … , 𝑒𝑗−1, 𝑇𝑗−1, 𝑄𝑗−1, 𝑖, 𝐶𝑖  𝑒𝑗−𝑭+4 , … , 𝑒𝑗−1 ->Previous private signals  𝑇𝑗−1 ->Current estimate of true ϴ  𝑄𝑗−1, ->update information for true ϴ  𝑖, 𝐶𝑖 ->indicates critical messages and CTUs used A NB-IoT device will determine its private signal(belief) 𝑥𝑖 by maximum likelihood estimation: 𝑥𝑖 = 𝑎𝑟𝑔max ϴ 𝑃𝑟(𝑒𝑗−𝑭+4 , … , 𝑒𝑗−1/ϴ)
  • 13. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 13 PERFORMANCE OF FMSL  Performance of FMSL depends on geographical location: Area A  Distance from critical event: 𝑟𝑑  Communication range among the devices: 𝑟𝑐  Total number of devices that correctly learn true ϴ: 𝑼𝜋𝑟𝑑 2 4𝐴 ≤ 𝐸 𝐿 ≤ 𝑼𝜋𝑟𝑑 2 𝐴  Effective Observation radius 𝑟𝑑 ′ = 𝑟𝑑 +(𝐹 − 4) 𝑟𝑐  𝐸 𝐿𝑡 :for occurrence after time t, 𝑟𝑡 =min(𝑟𝑐t, 𝑟𝑑 ′ ) 𝑼𝜋𝑟𝑡 2 4𝐴 ≤ 𝐸 𝐿𝑡 ≤ 𝑼𝜋𝑟𝑡 2 𝐴
  • 14. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 14 PROBABILITY OF SUCCESS AND COLLISION  Probability of successful transmission: 𝑈𝜋𝑟𝑡 2 4𝐴. 𝐶. 𝑇𝑚𝑖𝑛 ≤ 𝐸 𝑃𝑡 ≤ 𝑈𝜋𝑟𝑡 2 𝐴. 𝐶. 𝑇𝑚𝑖𝑛  We assume the binomial distribution to analyze collision probability  The Collision probability of a conventional UE-CTU mapping: 𝑃𝑐𝑜𝑛𝑣 = 𝐶 𝑘=2 𝑚 𝑝𝑚.𝑘.𝑝𝑘 𝑘=1 𝑚−1 𝑝𝒎−1.𝒌.𝑝 𝑘+1 +𝐶(1− 𝑘=2 𝑚 𝑝𝒎.𝒌.𝑝 𝒌=2 𝒎 𝑝𝒎.𝒌.𝑝𝑘) 𝐶𝑚𝑝  The Collision Probability for SL based CTU allocation: 𝑃𝑆𝐿 = ( 𝑘 + 1 1 − 𝑚𝑎 − 𝑚 1 − 𝑎 𝑚𝑝 1 − 𝑞𝑚−1 + 𝑚 1 − 𝑎 − 𝑘(1 − 𝑚𝑎)( 𝒎 + 1)𝑝 1 − 𝑞𝒎−1 ) 𝑚𝑝 𝑎 = 𝒌=2 𝒎 𝑝𝒎.𝒌.𝑝 = 𝒌=2 𝒎 𝑚 𝑝 𝑝𝑘𝑞𝒎−𝑘
  • 15. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 15 PARAMETERS USED  U ⇒ Number of devices deployed in the area A  𝐂 ⇒The number of CTUs  𝐓𝐦𝐢𝐧 ⇒Minimum periodicity of periodic messages  m⇒Average number of devices in a CTU,  𝑝 = 1 − 𝑞 ⇒traffic rate  k ⇒ number of devices transmitting at the same time within a CTU
  • 16. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 16 RESULTS AND DISCUSSION(1) Fig. 8. Probability of successful transmission  probability of successful transmission increases with F
  • 17. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 17 RESULTS AND DISCUSSION(2) Fig. 9. Number of devices that learn true ϴ(F=14, U=1500, C=280)  number of devices that learn correctly increases with time and F
  • 18. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 18 RESULTS AND DISCUSSION(3) Fig. 10. Comparison of probability of collision  Lower average collision rate than the conventional system
  • 19. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 19 CONCLUSIONS The contention based SCMA with FMSL system shows that performance in terms probability of successful transmission and the number of IoT devices that will correctly learn about the status of the nearby devices increases with memory size F.  Hence, FMSL improves system performance in terms of delivery of critical messages which are assigned certain codes after the learning process converges. When the devices are assigned certain codes after the learning process converges, the probability of collision decreases as compared to conventional systems.
  • 20. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 20 REFERENCES [1]. Y. D. Beyene, R. Jantti, K. Ruttik and S. Iraji, "On the Performance of Narrow- Band Internet of Things (NB-IoT)," 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, 2017, pp. 1-6. [2]. D. Lin, G. Charbit and I. K. Fu, "Uplink Contention Based Multiple Access for 5G Cellular IoT," 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), Boston, MA, 2015, pp. 1-5. [3]. S. Zhang, X. Xu, L. Lu, Y. Wu, G. He and Y. Chen, Sparse code multiple access: An energy efficient uplink approach for 5G wireless systems," 2014 IEEE Global Communications Conference, Austin, TX, 2014, pp. 4782-4787. [4]. J. Wang, C. Zhang, R. Li, G. Wang and J. Wang, Narrow-Band SCMA: A New Solution for 5G IoT Uplink Communications," 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, 2016, pp. 1-5.
  • 21. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 21 [5]. K. Au et al., "Uplink contention based SCMA for 5G radio access," 2014 IEEE Globecom Workshops (GCWkshps), Austin, TX, 2014, pp. 900-905. [6]. J. Shen, W. Chen, F. Wei and Y. Wu, "ACK feedback based UE-to-CTU mapping rule for SCMA uplink grant-free transmission," 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, 2017, pp. 1-6.Inf. Theory, vol. 59, no. 10, pp. 6859-6872, Oct. 2013. [7] T. Park and W. Saad, "Learning with finite memory for machine type communication," 2016 Annual Conference on Information Science and Systems (CISS), Princeton, NJ, 2016, pp. 608-613. [8] T. Park and W. Saad, "Resource Allocation and Coordination for Critical Messages Using Finite Memory Learning," 2016 IEEE Globecom Workshops (GC Wkshps), Washington, DC, 2016, pp. 1-6. REFERENCES
  • 22. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 22 RESEARCH CONTRIBUTION Bayisa Taye Mulatu, Zhenni Pan, Jiang Liu, Shigeru Shimamoto, “Contention-Based SCMA for Narrow-Band Internet of Things using Sequential Learning”, in a proceeding of the 37th JSST Annual International Conference on Simulation Technology, Muroran Institute of Technology, Muroran City, Hokkaido, Japan, September 18-20, 2018.
  • 23. Email : bd@archermind.com Web : www.archermind.com Project : General Usage Version: 1.0 Author: ArcherMind Marketing Confidential 23 Thank you for your attention!

Editor's Notes

  1. Clear images, what is MPA, how it works???
  2. Why not IFFT: ICI problem in IFFT , complex/expensive oscillators in IFFT, cheaper one since NB-SCMA has low cost devices
  3. Replot, add SCMA scalability aswell
  4. What are private signals! We have a geographical area->BS>IOT devices>Ititiate sequential learning coz of a critical event
  5. About the optimization, other parameters
  6. Why F-4
  7. What is conventional system? P each user average packet arrival rate per TTI
  8. Tmin?
  9. Why upper and lowe, time in seconds, longer time period
  10. Why the fixed values
  11. Change : traffic rate…what it the meaning? m=3,k=3